International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019
p-ISSN: 2395-0072
www.irjet.net
LOW BAND WIDTH HIGH SECURED IMAGE TRANSMISSION IN ROBUST CHANNELS PAPPULA JAYASRILAKSHMI2, SANTHI SRI RAYUDU2 1M.Tech
Student, Dept. of ECE, Prasiddha College of Engineering & Technology, Anathavaram, AP Professor, Dept. of ECE, Prasiddha College of Engineering & Technology, Anathavaram, AP ----------------------------------------------------------------------------***-------------------------------------------------------------------------2Assistant
ABSTRACT:- Privacy has always a growing impact on the modern applications and the growth in term of technology. The demand for the highest privacy must be guaranteed in the field of technical, commercial and legal regulations whenever sensitive information is stored, processed, or communicated in any form. Thus new technologies are also created new ways togather private information. In this system, to transmit data securely and to improve robustness, imperceptibility and payload capacity, combination of steganography and cryptography techniques are used. The referable values of secret image is embedded in the video file with the use of Arnold scrambling technique, discrete wavelet transformation and least significant bit. The secret key generated referable values of image is embedded behind the audio file. Before embedding of secret key, it is encrypted by a new proposed encryption algorithm, Twisted Exchange algorithm. Further, this project is enhanced by compressing secrete image to reduce bandwidth of the whole yield. So, computational time will be decreased to almost half to the former. Here, in this enhancement process HAAR wavelet transformation is used for reducing computational process. INTRODUCTION: Today images usually contain private or confidential information so that they should be protected from leakages during transmissions. Recently, many methods have been proposed for securing image transmission such as image encryption and data hiding. Image encryption is a technique that uses to encrypt image into noise form, using high redundancy and strong spatial correlation. The encrypted image is a meaningless file and before encryption additional information is not provided. Data hiding is alternative for image encryption that hide secret image into a cover image so that no one can realize the existence of the secret data. Large number of data is not hide into a single is the main issue of data hiding. Specifically, if one wants to hide a secret image into a cover image with the same size, the secret image must be highly compressed in advance. A new technique for secret image transmission is proposed with the help of secret image and target image. Select three images secret image, target image, and mosaic image. After selecting the target image, the given secret image is first divided into number of rectangular fragments called tile images, which then are fit into similar blocks in the target image, called target blocks, according to a comparison of colour transformation. Next, the color characteristic of each tile image is transformed into the other colour, resulting in a mosaic image which looks like the target image. Appropriate schemes are also proposed to conduct nearly lossless recovery of the original secret image from the resulting mosaic image [1].CURRENTLY, images from various sources are frequently utilized and transmitted through the internet for various applications, such as online personal photograph albums, confidential enterprise archives, document storage systems, medicalimaging systems, and military image databases. These images usually contain private or confidential information so that they should be protected from leakages during transmissions. Recently, many methods have been proposed for securing image transmission, for which two common approaches areimage encryption and data hiding. Image encryption is a technique that makes use of the natural property of an image, such as high redundancy and strong spatial correlation, to get an encrypted image based on Shannon’s confusion and diffusion properties [1]–[7]
© 2019, IRJET
|
Impact Factor value: 7.34
|
ISO 9001:2008 Certified Journal
|
Page 401